Hi SAGA,
You can definitely enable TLS 1.0 and 1.1 in Windows Server 2022 via the registry to support your legacy applications during the migration phase. While the operating system defaults to the much more secure TLS 1.2 and 1.3 protocols, the underlying architecture still includes the older protocols for backward compatibility. You will need to open the Registry Editor and navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols to make this change. Inside that path, you must create keys for TLS 1.0 and TLS 1.1, and within each of those, create both a Client and Server subkey. Setting the DisabledByDefault value to 0 and the Enabled value to 1 within those specific keys will turn the older protocols back on for your legacy apps.
Your assumption about SMB 1.0 is completely accurate. It is fully removed and disabled by default in Windows Server 2022 because of its well-documented and severe security vulnerabilities. While it is technically possible to reinstall it through Server Manager as a Windows Feature, doing so on a domain controller creates a massive security risk for your entire Active Directory environment and is strongly discouraged.
To verify which TLS versions are currently active on your server, there is no single graphical interface or dedicated native command provided by Windows. Instead, you can use the Get-ItemProperty cmdlet in PowerShell to query the exact SCHANNEL registry path mentioned earlier. If you run a query against that path and see no entries for TLS 1.0 or 1.1, it simply means the server is utilizing the secure operating system defaults and those older protocols remain safely turned off.
Hope this answer brought you some useful information. If it did, please hit “accept answer”. Should you have any questions, feel free to leave a comment.
VP